CSpace

浏览/检索结果: 共8条,第1-8条 帮助

已选(0)清除 条数/页:   排序方式:
Security risk and response analysis of typical application architecture of information and communication blockchain 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:  Zhao, Hongwei;  Zhang, Moli;  Wang, Shi;  Li, Entang;  Guo, Zhenhua;  Sun, Dianmin
收藏  |  浏览/下载:35/0  |  提交时间:2021/12/01
Information and communication blockchain  Network security risks  Homomorphic verifiable secret sharing  Risk response  
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:318/0  |  提交时间:2020/12/10
Artificial neural networks  Nonvolatile memory  Encryption  Computational modeling  Hardware  Non-volatile memory (NVM)  compute-in-memory (CIM)  neural network  security  encryption  
Context aware intrusion detection for building automation systems 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:  Pan, Zhiwen;  Hariri, Salim;  Pacheco, Jesus
收藏  |  浏览/下载:76/0  |  提交时间:2019/12/10
Internet of Things  Network security  Context awareness  Supervised learning  Data mining  Intrusion detection  
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:42/0  |  提交时间:2019/12/13
Network security  Anomaly detection  Stealthy maiware  Traffic analysis  Dependence analysis  Machine learning classification  
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms 期刊论文
COMPUTER COMMUNICATIONS, 2008, 卷号: 31, 期号: 17, 页码: 4018-4025
作者:  Li, Yang;  Guo, Li;  Tian, Zhi-Hong;  Lu, Tian-Bo
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/16
Network security  Web server anomaly detection  TCM-KNN algorithm  Genetic algorithm  
An active learning based TCM-KNN algorithm for supervised network intrusion detection 期刊论文
COMPUTERS & SECURITY, 2007, 卷号: 26, 期号: 7-8, 页码: 459-467
作者:  Li, Yang;  Guo, Li
收藏  |  浏览/下载:39/0  |  提交时间:2019/12/16
network security  intrusion detection  TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors)  algorithm  machine learning  active learning  
Topologically-aware AAA overlay network in mobile IPv6 environment 期刊论文
NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 卷号: 3976, 页码: 293-306
作者:  Li, Jun;  Ye, Xin-ming;  Tian, Ye
收藏  |  浏览/下载:37/0  |  提交时间:2019/12/16
mobile IPv6  AAA  overlay network  performance  security  
A novel computer architecture to prevent destruction by viruses 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 卷号: 17, 期号: 3, 页码: 241-248
作者:  Gao, QH;  Hu, Y;  Li, L;  Chen, X;  Liu, HL
收藏  |  浏览/下载:72/0  |  提交时间:2019/12/16
computer architecture  network security  computer virus